Seguir
Geumhwan Cho
Título
Citado por
Citado por
Año
On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks
Y Song, G Cho, S Oh, H Kim, JH Huh
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
882015
SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles
G Cho, J Cho, S Hyun, H Kim
Applied Sciences 10 (9), 3149, 2020
652020
Syspal: System-guided pattern locks for android
G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim
2017 IEEE Symposium on security and privacy (SP), 338-356, 2017
502017
An empirical study of click fraud in mobile advertising networks
G Cho, J Cho, Y Song, H Kim
2015 10th International Conference on Availability, Reliability and Security …, 2015
442015
A framework for security services based on software-defined networking
J Jeong, J Seo, G Cho, H Kim, JS Park
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
372015
Preventing DNS amplification attacks using the history of DNS queries with SDN
S Kim, S Lee, G Cho, ME Ahmed, J Jeong, H Kim
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
332017
Combating online fraud attacks in mobile-based advertising
G Cho, J Cho, Y Song, D Choi, H Kim
EURASIP Journal on Information Security 2016, 1-9, 2016
322016
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee, A Mohaisen
computers & security 78, 1-15, 2018
312018
Keyboard or keylogger?: a security analysis of third-party keyboards on android
J Cho, G Cho, H Kim
2015 13th Annual Conference on Privacy, Security and Trust (PST), 173-176, 2015
252015
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
202019
The personal identification chord: A four buttonauthentication system for smartwatches
I Oakley, JH Huh, J Cho, G Cho, R Islam, H Kim
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
182018
On the security and usability implications of providing multiple authentication choices on smartphones: The more, the better?
G Cho, JH Huh, S Kim, J Cho, H Park, Y Lee, K Beznosov, H Kim
ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-32, 2020
162020
Design and analysis of push notification-based malware on android
S Hyun, J Cho, G Cho, H Kim
Security and Communication Networks 2018, 2018
102018
Data-driven selection of security application frameworks during architectural design
H Cervantes, R Kazman, J Ryoo, J Cho, G Cho, H Kim, J Kang
82019
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices
J Cho, G Cho, S Hyun, H Kim
Journal of Internet Services and Information Security 7 (4), 35-44, 2017
72017
Towards usable and secure location-based smartphone authentication
G Cho, S Kwag, JH Huh, B Kim, CH Lee, H Kim
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 1-16, 2021
62021
On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation
JH Huh, S Kwag, I Kim, A Popov, Y Park, G Cho, J Lee, H Kim, CH Lee
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2023
12023
Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services
Y Son, G Cho, H Kim, S Woo
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
2019
A Methodology to Support the Selection of Security Frameworks
J Ryoo, J Cho, H Cervantes, R Kazman, G Cho, J Kang, H Kim, ...
2019
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack
S Cha, J Park, G Cho, JH Huh, H Kim
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20